e-Workplace Reports

Laptop, desktop PC and mobile device strategy: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide, you can find best practice, analysis of the latest trends, and expert advice on formulating enterprise strategy in laptops, desktop PCs and mobile devices.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

TechTarget Mobile Computing

To Build or to Buy? That is the Mobile App Question
sponsored by TechTarget Mobile Computing
EBOOK: This expert guide explores how to choose the best app deployment approach for your business needs and reveals 4 mobile app options that you may not have considered.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

TechTarget Mobile Computing

Modern Mobility E-zine: February 2016
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

TechTarget Mobile Computing

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Enterprise Mobility Management: Top considerations and challenges
sponsored by Microsoft
EGUIDE: Download this expert e-guide to take a look at the top 5 considerations for implementing an EMM strategy, and learn how to overcome challenges such as managing too many devices, BYOD, and lack of policies.
Posted: 27 Oct 2017 | Published: 23 Oct 2017

Microsoft

5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Shifting Unified Communications into the Cloud and Mobile Apps
sponsored by TechTarget Unified Communications
EBOOK: This Technical Guide explores the disconnect between UC applications and how employees in sales, marketing, customer service and other departments do their job. It also discusses how vendors are working to integrate UC capabilities in popular work software, like customer-management applications, on both desktop and mobile devices.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

TechTarget Unified Communications

Mobile App Development: Today's Platforms and Trends
sponsored by Red Hat
EGUIDE: This e-guide provides 6 key considerations to keep in mind when searching for a mobile application development platform. Additionally, learn how cross-platform mobile development tools simplify the mobile application development process and discover the symbolic relationship between mobile devices and cloud computing through an in-depth Q&A.
Posted: 09 Sep 2016 | Published: 08 Sep 2016

Red Hat

Sleeping Android: the danger of dormant permissions
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

TechTarget ComputerWeekly.com